Toggle light / dark theme

Quantum materials exhibit remarkable emergent properties when they are excited by external sources. However, these excited states decay rapidly once the excitation is removed, limiting their practical applications.

A team of researchers from Harvard University and the Paul Scherrer Institute PSI have now demonstrated an approach to stabilize these fleeting states and probe their using bright X-ray flashes from the X-ray free electron laser SwissFEL at PSI. The findings are published in the journal Nature Materials.

Some materials exhibit fascinating quantum properties that can lead to transformative technologies, from lossless electronics to high-capacity batteries. However, when these materials are in their natural state, these properties remain hidden, and scientists need to gently ask for them to pop up.

Researchers have published the demonstration of a fully-integrated single-chip microwave photonics system, combining optical and microwave signal processing on a single silicon chip.

The chip integrates high-speed modulators, optical filters, photodetectors, as well as transfer-printed lasers, making it a compact, self-contained and programmable solution for high-frequency .

This breakthrough can replace bulky and power-hungry components, enabling faster wireless networks, low-cost microwave sensing, and scalable deployment in applications like 5G/6G, , and .

MIT physicists have demonstrated a new form of magnetism that could one day be harnessed to build faster, denser, and less power-hungry “spintronic” memory chips.

The new magnetic state is a mash-up of two main forms of magnetism: the ferromagnetism of everyday fridge magnets and compass needles, and antiferromagnetism, in which materials have magnetic properties at the microscale yet are not macroscopically magnetized.

Now, the MIT team has demonstrated a new form of magnetism, termed “p-wave magnetism.”

In a study by TU Wien and FU Berlin, researchers have measured what happens when quantum physical information is lost. This clarifies important connections between thermodynamics, information theory and quantum physics.

Heat and information—these are two very different concepts that, at first glance, appear to have nothing to do with each other. Heat and energy are central concepts in thermodynamics, an important field of physics and even one of its cornerstones. Information theory, on the other hand, is an abstract topic in mathematics.

But as early as the 1960s, physicist Rolf Landauer was able to show that the two are closely related: the deletion of information is inevitably linked to the exchange of energy. You cannot delete a data storage device without releasing heat to the outside world.

Transistors are fundamental to microchips and modern electronics. Invented by Bardeen and Brattain in 1947, their development is one of the 20th century’s key scientific milestones. Transistors work by controlling electric current using an electric field, which requires semiconductors. Unlike metals, semiconductors have fewer free electrons and an energy band gap that makes it harder to excite electrons.

Doping introduces , enabling current flow under an electric field. This allows for nonlinear current-voltage behavior, making signal amplification or switching possible, as in p–n junctions. Metals, by contrast, have too many that quickly redistribute to cancel external fields, preventing controlled current flow—hence, they can’t be used as traditional transistors.

However, recent advances show promise in ultrathin superconducting metals as potential transistor materials. When cooled below a , these materials carry current with zero resistance. This behavior arises from the formation of Cooper pairs—electrons bound by lattice vibrations—that condense into a coherent quantum state, immune to scattering and energy loss.

A new electrode enables scalable hydrogen production from seawater, offering a clean, desalination-free solution for arid coastal regions. Researchers at the University of Sharjah have developed a new technology that can produce clean hydrogen fuel directly from seawater, and at an industrial sca

Cybersecurity researchers have flagged several popular Google Chrome extensions that have been found to transmit data in HTTP and hard-code secrets in their code, exposing users to privacy and security risks.

“Several widely used extensions […] unintentionally transmit sensitive data over simple HTTP,” Yuanjing Guo, a security researcher in the Symantec’s Security Technology and Response team, said. “By doing so, they expose browsing domains, machine IDs, operating system details, usage analytics, and even uninstall information, in plaintext.”

The fact that the network traffic is unencrypted also means that they are susceptible to adversary-in-the-middle (AitM) attacks, allowing malicious actors on the same network such as a public Wi-Fi to intercept and, even worse, modify this data, which could lead to far more serious consequences.

Stating that Bitter frequently singles out an “exceedingly small subset of targets,” Proofpoint said the attacks are aimed at governments, diplomatic entities, and defense organizations so as to enable intelligence collection on foreign policy or current affairs.

Attack chains mounted by the group typically leverage spear-phishing emails, with the messages sent from providers like 163[.]com, 126[.]com, and ProtonMail, as well as compromised accounts associated with the governments of Pakistan, Bangladesh, and Madagascar.

The threat actor has also been observed masquerading as government and diplomatic entities from China, Madagascar, Mauritius, and South Korea in these campaigns to entice recipients into malware-laced attachments that trigger the deployment of malware.

Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the same question: what is the business getting in return? CISOs respond with reports on controls and vulnerability counts – but executives want to understand risk in terms of financial exposure, operational impact, and avoiding loss.

The disconnect has become difficult to ignore. The average cost of a breach has reached $4.88 million, according to recent IBM data. That figure reflects not just incident response but also downtime, lost productivity, customer attrition, and the extended effort required to restore operations and trust. The fallout is rarely confined to security.

Security leaders need a model that brings those consequences into view before they surface. A Business Value Assessment (BVA) offers that model. It links exposures to cost, prioritization to return, and prevention to tangible value.

IN A NUTSHELL 🔬 Researchers have developed QNodeOS, an innovative operating system that unifies different quantum computing technologies. 🌐 QNodeOS features two main units, the CNPU and QNPU, which simplify the management of diverse quantum devices through a single interface. 🔑 The QDriver acts as a translator, converting universal instructions into specific commands for various